CN103685198B - A kind of method and apparatus of interaction of user data - Google Patents
A kind of method and apparatus of interaction of user data Download PDFInfo
- Publication number
- CN103685198B CN103685198B CN201210356956.6A CN201210356956A CN103685198B CN 103685198 B CN103685198 B CN 103685198B CN 201210356956 A CN201210356956 A CN 201210356956A CN 103685198 B CN103685198 B CN 103685198B
- Authority
- CN
- China
- Prior art keywords
- access
- user
- mark
- data traffic
- subset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Abstract
This application discloses a kind of method and apparatus of interaction of user data, for improving the safety of website visiting.The method selects at least one header domain information and network address mark from each access the access request that user submits to, composition is multiple to access set, and determine that each accesses the corresponding information loss rate of set, each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and interacts each user data accessing user accordingly.Due in said process, website need not respectively access user's corresponding unification user mark to third-party server application, therefore decrease user profile and divulge a secret chance, increased the safety of website visiting.
Description
Technical field
The application is related to Internet technical field, more particularly, to a kind of method and apparatus of interaction of user data.
Background technology
With the development of Internet technology, between each internet site, pass through the use of interactive access user to a certain extent
User data is such that it is able to be appreciated more fully from the access information of user so that each internet site can believe according to the access of user
Breath, provides the user the product more conforming to user's request.
In order to realize the purpose of the user data of the same user of interaction between different internet sites, each internet site
It needs to be determined that a unique mark is used for identifying user, and in interaction of user data, this user is interacted according to this unique mark
User data.Specifically, each internet site, when user accesses, can send request to uniform server, to apply for this use
The unique mark at family, the subscription client feature carrying in the request that uniform server sends according to website generates this user and corresponds to
Unique mark, and return to each website, this unique mark is write in subscription client Cookie by each website, each the Internet net
The user data stood further according to this unique mark this user of interaction.
In said process, due to each website be required to as third-party uniform server application access user corresponding
Unique mark, and by application to unique mark be stored in subscription client Cookie, there is user profile and divulge a secret risk in this,
Reduce the safety of website visiting.
Content of the invention
The application provides a kind of method and apparatus of interaction of user data, for improving the safety of website visiting.
The embodiment of the present application provides a kind of method of interaction of user data, including:
Receive each access request accessing user's submission, the initial user carrying access user in access request identifies, extremely
A few header domain information and network address mark;
Select at least one header domain information from the header domain information that each access request carries, using the header field of selection
Information and the access user corresponding network address multiple access of mark composition are gathered;
For multiple each access set accessing in set, determine that this access is integrated into right in the range of specified data traffic
The information loss rate answered;
Each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and according to each access
The each user data accessing user of unification user mark interaction of user.
The embodiment of the present application provides a kind of device of interaction of user data, including:
Receiving unit, for receiving each access request accessing user's submission, carries in access request and accesses the first of user
Beginning ID, at least one header domain information and network address mark;
Select unit, for select from the header domain information that each access request carries at least one header domain information and
Access the user corresponding network address multiple access of mark composition to gather;
Determining unit, for accessing set for each, determines that this access is integrated into corresponding in the range of specified data traffic
Information loss rate;
Data interaction unit, determines each unification user accessing user for the set that accesses minimum according to information loss rate
Mark, and according to each each user data accessing user of unification user mark interaction accessing user.
The embodiment of the present application provides a kind of method and device of interaction of user data, and the method accesses what user submitted to from each
At least one header domain information and network address mark is selected, composition is multiple to access set, and determines each visit in access request
Ask set corresponding information loss rate, each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum
Know, and interact each user data accessing user accordingly.Because, in said process, website need not be each to third-party server application
Access user's corresponding unification user mark, therefore decrease user profile and divulge a secret chance, increased the safety of website visiting.
Brief description
The process of the interaction of user data that Fig. 1 provides for the embodiment of the present application;
Fig. 2 is integrated into corresponding information loss in the range of target flow for one access of determination that the embodiment of the present application provides
The process of rate;
Fig. 3 closes the corresponding relation schematic diagram and initial user mark between for the access subset that the embodiment of the present application provides;
The apparatus structure schematic diagram of the interaction of user data that Fig. 4 provides for the embodiment of the present application.
Specific embodiment
User is accessed for each due between website each in prior art during interaction of user data, need to utilize and be somebody's turn to do
Some relevant informations accessing user identify to the corresponding unification user of third-party server application this access user, therefore,
There is certain risk of divulging a secret during this, reduce the safety of website visiting.In view of this, the embodiment of the present application is using each
Access the header domain information carrying in the access request that user submits to and determine that unification user identifies, and need not be to third-party server
Application unification user mark, to reduce the purpose of user profile risk of leakage, the safety of raising website visiting.
Below in conjunction with Figure of description, the preferred embodiment of the application is illustrated it will be appreciated that described herein
Preferred embodiment is merely to illustrate and explains the application, is not used to limit the application, and in the case of not conflicting, this Shen
Please in embodiment and the feature in embodiment can be mutually combined.
The process of the interaction of user data that Fig. 1 provides for the embodiment of the present application, comprises the following steps:
S101:Receive each access request accessing user's submission.
Wherein, one access user submit to access request in carry this access user initial user mark, at least one
Individual header domain information and network address mark.Network address mark can be for accessing user's corresponding network interconnection agreement
(Internet Protocol, IP) address;The initial user mark of user can identify for user cookie;Work as access request
When being HTML (Hypertext Markup Language) (hypertext transport protocol, http) access request, this access request carries
Header field information include at least one in following information:Accept-Language (language that user accepts) information,
Accept-Encoding (coded system that user accepts) information, User-Agent (user agent) information and user client
Client information, subscription client information includes:UA-Pixels (subscription client pixel) information, UA-Color (subscription client color
Color) information, UA-OS (subscription client operating system) information, UA-CPU (subscription client CPU) information etc..Separately
Outward, access request can also be the access request of other agreements, specifically do not limit in the application.
S102:Select at least one header domain information from the header domain information that each access request carries, using selection
Header domain information and the access user corresponding network address multiple access of mark composition are gathered.
For the ease of description, respectively with A, B, C, D represent Accept-Language, Accept-Encoding, User-
Agent and subscription client information, for example, access for user it is assumed that access user is corresponding for network address identical
Network address mark is IP1, then, according to the permutation and combination between this four kinds of header domain informations, 15 can be formed () plant to access and gather, respectively:[A, IP1], [B, IP1], [C, IP1], [D, IP1], [A, B, IP 1],
[A, C, IP 1], [A, D, IP1], [B, C, IP1], [B, D, IP1], [C, D, IP1], [A, B, C, IP1], [A, B, D, IP1],
[A, C, D, IP1], [B, C, D, IP1], [A, B, C, D, IP1].
S103:For multiple each access set accessing in set, determine that this access is integrated into specified data traffic model
Enclose interior corresponding information loss rate.
In the embodiment of the present application, this specified data traffic scope can be set first, specifically can set according to actual needs
Put this data traffic scope.For example, this specified data traffic scope could be arranged to specify the data of (in 1 day) in the time period
Flow.And for example, for e-commerce website, its data traffic source is main to be included:Login page and the number of user mutual
According to the data traffic of the data traffic of flow, the goods browse page and user mutual, the commodity transaction page and user mutual, because
This is it is also possible to be set to a certain kind or the page of several types and the data flow of user mutual by this specified data traffic scope
Amount.
After being provided with this specified data traffic scope, then can determine respectively by above-mentioned steps S102 form every
Individual access is integrated into the information loss rate in the range of this specified data traffic.
For one accesses set, the information loss rate that this access is integrated in the range of this specified data traffic is permissible
Characterize:Determine the accuracy of each unification user mark accessing user, credibility in other words using this access set.That is, should
The information loss rate that access is integrated in the range of this specified data traffic is lower, determines each access user's using this access set
The accuracy of unification user mark is higher, and credibility is bigger in other words, conversely, this access is integrated into this specified data traffic scope
Interior information loss rate is higher, determines that using this access set the accuracy of each unification user mark accessing user is lower, or
Person says that credibility is less.
S104:Each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and according to
Each each user data accessing user of unification user mark interaction accessing user.
The information loss rate being integrated into due to an access in the range of specified data traffic is lower, true using this access set
The accuracy of fixed each unification user mark accessing user is higher, therefore, in each access set being formed by step S102,
The minimum access set of the information loss rate in the range of specified data traffic selected, and according to this access set selected
Determine each unification user mark accessing user, the accuracy improving the unification user mark determining that can try one's best.Follow-up then
Can be according to each user data accessing user of unification user mark interaction of each access user determining.
Specifically, in step S103 shown in above-mentioned Fig. 1, access set for each, determine that this access is integrated into finger
Fixed number is as shown in Figure 2 according to the method for information loss rate corresponding in range of flow.
Fig. 2 is integrated into corresponding information loss in the range of target flow for one access of determination that the embodiment of the present application provides
The process of rate, specifically includes following steps:
S1031:The content of the header domain information being comprised according to this access set, this access set is reconfigured as multiple
Access subset closes.
Wherein, the element that each access subset closes is content and the network address mark of header domain information.
For example, it is assumed that there being 3 users to have submitted access request, the initial user mark of this 3 users is respectively B1、B2、
B3, the network address mark of this 3 access users is IP1 it is intended that the quantity of data traffic in the range of data traffic is 50
Individual, it is now to determine the access collection that the element comprising is Accept-Language information, Accept-Coding information and IP1
[Accept-Language information, Accept-Coding information, IP1] the information loss rate in the range of target flow of conjunction.
If in the access request that this 3 users submit to, the particular content of Accept-Language information is Chinese,
And the particular content of Accept-Coding information is coded system 1 and totally two kinds of coded system 2, then, for network address mark
Know and be this 3 of IP1 access users, for access set [Accept-Language information, Accept-Coding information,
IP1] access subset recombinated closes and is:[Chinese, coded system 1, IP1] and [Chinese, coded system 2, IP1].
For the ease of description, below with A1Represent Chinese and English, with C1And C2Presentation code mode 1 and coding staff respectively
Formula 2 illustrates.
Namely the access subset of restructuring is combined into:[A1, C1, IP1] and [A1, C2, IP1].
S1032:In the range of this specified data traffic, count each access subset and be combined in each self-corresponding all initial use
The data traffic carrying in the mark of family.
Because the header domain information carrying in access request is all from standard agreement, therefore, different access is used
For family, the content of request header domain information that carries in its access request submitted to may identical it is also possible to different, that is,
For an access subset closes, its corresponding access user may more than one.In addition, coming for same access user
Say, in its different access request submitted to entrained header domain information may identical it is also possible to different.
Continue to use the example above it is assumed that:
Identify B in initial user1In the access request that corresponding access user submits to, exist using Chinese, coded system
1st, the access request that IP1 submits to, there is also the access request submitted to using Chinese, coded system 2, IP1;
Identify B in initial user2In the access request that corresponding access user submits to, exist using Chinese, coded system
1st, the access request that IP1 submits to, there is also the access request submitted to using Chinese, coded system 2, IP1;
Identify B in initial user3In the access request that corresponding access user submits to, only exist using Chinese, coding staff
The access request that formula 1, IP1 submit to.
Then:Access subset closes [A1, C1, IP1] and [A1, C2, IP1], with user initial marking B1、B2、B3Corresponding relation
As shown in Figure 3.Fig. 3 closes the corresponding relation and initial user mark between for the access subset that the embodiment of the present application provides and illustrates
Figure, in figure 3, access subset closes [A1, C1, IP1] and identify B with initial user1、B2、B3Corresponding, access subset closes [A1, C2,
IP1] identify B with initial user1、B2Corresponding.
Therefore, in the range of specified data traffic, namely in 50 data traffics, count [A1, C1, IP1] and corresponding
B1、B2、B3The data traffic of upper carrying, counts [A1, C2, IP1] and in corresponding B1、B2The data traffic of upper carrying.
Specifically, one access subset of statistics is combined in the data traffic carry in its corresponding all initial user mark
Method is:In the range of specified data traffic, the data traffic, the conjunction of this access subset that count the conjunction carrying of this access subset are corresponding
Initial user identifies quantity, and this access subset closes the number that the corresponding access subset of corresponding each initial user mark closes
Amount;Close corresponding each initial user mark for this access subset, determine that this access subset is combined in this initial user mark and holds
The data traffic carrying;This access subset is combined in the data traffic sum carry in its corresponding each initial user mark, really
It is set to this access subset and the data traffic carry is combined on its corresponding all initial user mark.
Wherein it is possible to adopt formulaDetermine that an access subset is combined in its corresponding initial user mark and carries
Data traffic, N is that this access subset closes the data traffic carrying, and this access subset of i closes corresponding initial user and identifies quantity,
J is the quantity that the corresponding access subset of this initial user mark closes.
Continue to use the example above it is assumed that in 50 data traffics specifying at this, having 30 to be carried on [A1, C1, IP1] on, have
20 are carried on [A1, C2, IP1] on, then:
For [A1, C1, IP1], N=30, its corresponding initial user mark is respectively B1、B2、B3, i=3, initial user
Mark B1Corresponding access subset closes and is respectively [A1, C1, IP1] and [A1, C2, IP1], j=2, therefore, [A1, C1, IP1] carry
In B1On data traffic be ((30/3)/2)=5;
Similar, [A1, C1, IP1] and it is carried on B2On data traffic be ((30/3)/2)=5, [A1, C1, IP1] carry
In B3On data traffic be (30/3)=10, thus, access subset close [A1, C1, IP1] at it corresponding all initial
The data traffic carrying in ID is (5+5+10)=20.
Accordingly, [A1, C2, IP1] and it is carried on B1On data traffic be ((20/2)/2)=5, [A1, C2, IP1] carry
In B2On data traffic be ((20/2)/2)=5, therefore access subset closes [A1, C2, IP1] and corresponding all initial at it
The data traffic carrying in ID is (5+5)=10.
S1033:The number carry in each self-corresponding all initial user marks is combined according to each access subset of statistics
According to flow, determine that this access is integrated into corresponding information loss rate in the range of specified data traffic.
Specifically, formula can be adoptedDetermine that this access is integrated into corresponding information in the range of specified data traffic
Loss rate, R represents that each access subset that this access set comprises is combined in and carries in each self-corresponding all initial user marks
Data traffic sum, W represents all data traffic sums comprising in the range of specified data traffic.
Continue to use the example above, due to [A1, C1, IP1] and identify, in corresponding all initial users, the data flow carrying at it
Measure as 20, access subset closes [A1, C2, IP1] and in its corresponding all initial user mark, the data traffic of carrying is 10
Individual, therefore R=20+10=30, W=50, thus, [Accept-Language information, Accept-Coding believes to access set
Breath, IP1] in this 50 data traffics, corresponding information loss rate is:1-30/50=0.4.
It is more than that the information that one access of determination that the embodiment of the present application provides is integrated in the range of specified data traffic is damaged
The method of mistake rate.In subsequent process, then can select the minimum set that accesses of information loss rate and determine each access user's
Unification user identifies, and according to each each user data accessing user of unification user mark interaction accessing user.
Wherein, according to the method tool accessing each unification user mark accessing user of set determination that information loss rate is minimum
Body is:The different access subclass comprising in being gathered using minimum the accessing of information loss rate respectively is as the system of different access user
One ID.
Continue to use the example above, if accessing set [Accept-Language information, Accept-Coding information, IP1]
Information loss rate minimum, then with this access set [Accept-Language information, Accept-Coding information, IP1]
The access subset comprising closes [A1, C1, IP1] and as a same ID accessing user, [A is closed with access subset1, C2,
IP1] access the same ID of user as another.
It should be noted that in upper example, initial user is identified with 3, namely there are 3 access users, and finally determine
The unification user mark only 2 going out, can only identify 2 access users with this 2 unification user marks, so, adopt one
When each access subset comprising in individual access set closes identification access user, the accuracy of its mark can decline.And it is accurate
Property the degree that declines it is simply that being characterized by the information loss rate of above-mentioned calculating, therefore, in the embodiment of the present application will be according to letter
Cease the minimum access set of loss rate to determine unification user mark.
Further it is also desirable to:Find a kind of access to gather, this each comprising in set that access accesses son
Set and each initial user mark are completely one-to-one relations.So, the different access with comprising in this access set
Subclass is come to identify the accuracy rate of different access user be 100%.But, almost can not find such access in practical application and collect
Close, that is, for one accesses set, if each access subset that it comprises closes identified not with each initial user
It is one-to-one relation, then, when closing identification access user with the access subset in this access set, will result in accuracy rate
Decline.The situation that accuracy rate declines is caused to have following two:
When situation one, different access users adopt same access subset to close carrying data traffic, this same access
Subclass does not identify different users.For example, the initial user in upper example is designated B1、B2、B33 access users, this
3 access user and all adopt access subset to close [A1, C1, IP1] and carry data traffic, but access subset closes [A1, C1, IP1]
An access user can only be identified, that is, equally adopting [A1, C1, IP1] and carry 3 access users of data traffic not by area
Branch away.
When situation two, same access user adopt different access subsets to close carrying data traffics, this same user
The data traffic carrying can be identified as the data traffic that different users carry.For example, the initial user in upper example is designated
B1Access user, this access user adopt access subset close [A1, C1, IP1] and [A1, C2, IP1] and carry data traffic, but
It is, [A1, C1, IP1] and [A1, C2, IP1] and identify different users respectively, that is, being equally that initial user is designated B1Visit
Ask that the data traffic that user carries but has been identified as the data traffic that two different users carry.
Therefore, the information loss amount that an access of above-mentioned calculating is integrated in specified data traffic access is it is simply that counting
When calculating each access subset conjunction mark each access user adopting in this access set, due to above-mentioned situation one and situation two
The decline of the accuracy rate brought.
Thus, for the computational methods in upper example it is also understood that:
As shown in figure 3, closing [A for access subset1, C1, IP1], because 3 access users employ [A1, C1, IP1]
Carry data traffic, be therefore based on situation one, no matter adopt [A1, C1, IP1] and identified which access user, its accuracy rate also only hasFurther, on the basis of based on situation one, when using [A1, C1, IP1] and mark B1During corresponding access user, it is based on
Situation two, B1Corresponding access user adopts [A1, C2, IP1] and the data traffic that carries also can be identified as other users and carry
Data traffic, therefore adopts [A1, C1, IP1] and mark B1Corresponding access user accuracy rate beLikewise, adopting [A1,
C1, IP1] and mark B2Corresponding access user accuracy rate beUsing [A1, C1, IP1] and mark B3Corresponding access user
Accuracy rate beTherefore, [A is closed using access subset1, C1, IP1] mark one access user accuracy rate be
Similar, close [A for access subset1, C2, IP1], due to two access user (B1Corresponding access user and B2
Corresponding access user) employ [A1, C2, IP1] and carry data traffic, therefore it is based on situation one, no matter adopt [A1, C2,
IP1] identify in this two which access user, its accuracy rate also only hasFurther, on the basis based on situation one
On, when using [A1, C2, IP1] and mark B1During corresponding access user, based on situation two, B1Corresponding access user adopts [A1,
C1, IP1] and the data traffic that carries also can be identified as the data traffic of other users carrying, therefore adopt [A1, C2, IP1] and mark
Know B1Corresponding access user accuracy rate beLikewise, adopting [A1, C2, IP1] and mark B2Corresponding access user's
Accuracy rate isTherefore, [A is closed using access subset1, C2, IP1] mark one access user accuracy rate be
Consider further that [A1, C1, IP1] and the shared ratio in total flow of the data traffic that carries[A1, C2, IP1] hold
The ratio shared in total flow of data traffic carryingThen in this 50 data traffics, gather [Accept- using accessing
Language information, Accept-Coding information, IP1] in two access subsets comprising close and identify different access respectively and use
The accuracy rate at family is:Therefore, its accuracy rate have dropped
1-0.6=0.4, that is, information loss rate is 0.4.
Thus, it is as initial with each as possible that the embodiment of the present application actually finds a kind of each comprising access subset conjunction
ID accesses set close to one-to-one, uses that is, determining to access using the minimum access set of information loss rate
The unification user mark at family.
It is preferred that in order to ensure availability access user being identified using access set, in the embodiment of the present application,
Information loss rate threshold value can be pre-set, when the minimum access set corresponding information loss rate of information loss rate is less than in advance
If during threshold value, then the access subset that minimum the accessing of information loss rate comprises in gathering closes and can be used for identification access user, when
When the minimum access set corresponding information loss rate of information loss rate exceedes predetermined threshold value, illustrate to wrap using in this access set
The accuracy rate that the access subset containing closes identification access user is too low, and the access subset therefore comprising in this access set closes and cannot use
In identification access user.
In the embodiment of the present application, because same user has different user data in different web sites, for example, search at certain
There is the data to keyword search website, has the access data to each channel page in portal website, has in e-commerce website
The behavioral datas such as goods browse, collection and transaction, therefore can preserve the different pieces of information of same user respectively in each website.
After determining unification user mark it is possible to according to the unification user of this user mark to this user different web sites difference
Data is spliced so that user data is more complete, and subsequently each website can be used for Optimizing Search, individual character according to their needs
Change in the applications such as page push, advertisement pushing optimization.
Based on same application design, additionally provide a kind of device of interaction of user data in the embodiment of the present application, due to this
To website visiting ID, the principle of device solve problem determines that method is similar, the enforcement of therefore this device may refer to method
Enforcement, repeat no more in place of repetition.
The apparatus structure schematic diagram of the interaction of user data that Fig. 4 provides for the embodiment of the present application, specifically includes:
Receiving unit 401, for receiving each access request accessing user's submission, carries in access request and accesses user's
Initial user mark, at least one header domain information and network address mark;
Select unit 402, for selecting at least one header domain information from the header domain information that each access request carries
And access the multiple access set of user corresponding network address mark composition;
Determining unit 403, for accessing set for each, determines that this access is integrated into right in the range of specified data traffic
The information loss rate answered;
Data interaction unit 404, determines each unification accessing user for the set that accesses minimum according to information loss rate
ID, and according to each each user data accessing user of unification user mark interaction accessing user.
Described determining unit 403, including:
Combination subelement 4031, for accessing set for each, the header domain information being comprised according to this access set
Content, this access set is reconfigured and closes for multiple access subsets, and the element that each access subset closes is header domain information
Content and network address mark;
Statistics subelement 4032, is combined in each in the range of described specified data traffic, counting each access subset
The data traffic carrying in corresponding all initial user marks;
Determination subelement 4033, for being combined in each self-corresponding all initial user marks according to each access subset of statistics
The data traffic carrying in knowledge, determines that this access is integrated into corresponding information loss rate in the range of described specified data traffic.
According to below equation, described determination subelement 4033 is specifically for determining that this access is integrated into described specified data flow
Corresponding information loss rate in the range of amount:Wherein:R represents that each access subset that this access set comprises is combined in each
The data traffic sum carrying in corresponding all initial user marks;W represents that comprise in the range of specified data traffic owns
Data traffic sum.
Described statistics subelement 4032, including:
Statistical module 40321, for closing for each access subset, in the range of described specified data traffic, statistics should
Access subset closes the data traffic carrying, this access subset closes corresponding initial user and identifies quantity, and this access subset closes
Corresponding each initial user identifies the quantity that corresponding access subset closes;
First determining module 40322, for closing corresponding each initial user mark for this access subset, determines this visit
Ask the data traffic that subclass carries in this initial user mark;
Second determining module 40323, carries for being combined in this access subset in its corresponding each initial user mark
Data traffic sum, be defined as this access subset and the data traffic carry be combined on corresponding all initial users mark.
According to below equation, described first determining module 40322 is specifically for determining that this access subset is combined in this initial use
The data traffic that family mark carries:Wherein:N is that this access subset closes the data traffic carrying;It is right that this access subset of i closes
The initial user mark quantity answered;J is the quantity that the corresponding access subset of this initial user mark closes.
Described data interaction unit 404 is additionally operable to, and determines that each access is used in the access set minimum according to information loss rate
Before the unification user mark at family, determine that the minimum access set corresponding information loss rate of information loss rate is less than default threshold
Value.
Described data interaction unit 404 is specifically for being comprised not with minimum the accessing in set of information loss rate respectively
The unification user mark being different access user with access subset cooperation.
Specifically the device of above-mentioned interaction of user data may be located in the server of website.
The embodiment of the present application provides a kind of method and device of interaction of user data, and the method accesses what user submitted to from each
At least one header domain information and network address mark is selected, composition is multiple to access set, and determines each visit in access request
Ask set corresponding information loss rate, each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum
Know, and interact each user data accessing user accordingly.Because, in said process, website need not be each to third-party server application
Access user's corresponding unification user mark, therefore decrease user profile and divulge a secret chance, increased the safety of website visiting.
Those skilled in the art are it should be appreciated that embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can be using complete hardware embodiment, complete software embodiment or the reality combining software and hardware aspect
Apply the form of example.And, the application can be using in one or more computers wherein including computer usable program code
The upper computer program implemented of usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) produces
The form of product.
The application is the flow process with reference to method, equipment (system) and computer program according to the embodiment of the present application
Figure and/or block diagram are describing.It should be understood that can be by each stream in computer program instructions flowchart and/or block diagram
Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor instructing general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device is to produce
A raw machine is so that produced for reality by the instruction of computer or the computing device of other programmable data processing device
The device of the function of specifying in present one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing device with spy
Determine in the computer-readable memory that mode works so that the instruction generation inclusion being stored in this computer-readable memory refers to
Make the manufacture of device, this command device realize in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or
The function of specifying in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that counting
On calculation machine or other programmable devices, execution series of operation steps to be to produce computer implemented process, thus in computer or
On other programmable devices, the instruction of execution is provided for realizing in one flow process of flow chart or multiple flow process and/or block diagram one
The step of the function of specifying in individual square frame or multiple square frame.
Although having been described for the preferred embodiment of the application, those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to including excellent
Select embodiment and fall into being had altered and changing of the application scope.
Obviously, those skilled in the art can carry out the various changes and modification essence without deviating from the application to the application
God and scope.So, if these modifications of the application and modification belong to the scope of the application claim and its equivalent technologies
Within, then the application is also intended to comprise these changes and modification.
Claims (10)
1. a kind of method of interaction of user data is it is characterised in that include:
Receive each access user submit to access request, carry in access request access user initial user mark, at least one
Individual header domain information and network address mark;
Select at least one header domain information from the header domain information that each access request carries, using the header domain information of selection
And access the multiple access set of user corresponding network address mark composition;
For multiple each access set accessing in set, determine that this access is integrated into corresponding in the range of specified data traffic
Information loss rate, wherein, information loss rate characterizes and determines each unification user mark accessing user using this access set
Accuracy;
Each described unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and according to each access
The each user data accessing user of described unification user mark interaction of user.
2. the method for claim 1 is it is characterised in that for multiple each access set accessing in set, determine
This access is integrated into corresponding information loss rate in the range of specified data traffic, specifically includes:
Access set for each, the content of the header domain information comprising according to this access set, by this access set group again
It is combined into multiple access subsets to close, the element that each access subset closes is content and the network address mark of header domain information;
In the range of described specified data traffic, count each access subset and be combined in each self-corresponding all initial user marks
The data traffic carrying;
The data traffic carry in each self-corresponding all initial user marks is combined according to each access subset of statistics, determines
This access is integrated into corresponding information loss rate in the range of described specified data traffic.
3. method as claimed in claim 2 is it is characterised in that this access of described determination is integrated in the range of specified data traffic
Corresponding information loss rate, determines according to below equation formula:
Wherein,
R represents that each access subset that this access set comprises is combined in the number carry in each self-corresponding all initial user marks
According to flow sum;
W represents all data traffic sums comprising in the range of specified data traffic.
4. method as claimed in claim 3 is it is characterised in that one access subset of statistics is combined in its corresponding all initial use
The data traffic carrying in the mark of family, specifically includes:
In the range of described specified data traffic, count this access subset and close the data traffic carrying, this access subset conjunction correspondence
Initial user mark quantity, and this access subset closes the number that the corresponding access subset of corresponding each initial user mark closes
Amount;
Close corresponding each initial user mark for this access subset, determine that this access subset is combined in this initial user mark and holds
The data traffic carrying;
This access subset is combined in the data traffic sum carry in its corresponding each initial user mark, is defined as this access
The data traffic that subclass carries in its corresponding all initial user mark.
5. according to below equation, method as claimed in claim 4 is it is characterised in that determine that this access subset is combined in this initial use
The data traffic that family mark carries:
Wherein:
N is that this access subset closes the data traffic carrying;
This access subset of i closes corresponding initial user and identifies quantity;
J is the quantity that the corresponding access subset of this initial user mark closes.
6. the method for claim 1 is it is characterised in that determine each access according to the minimum access set of information loss rate
Before the unification user mark of user, also include:
Determine that the minimum access set corresponding information loss rate of information loss rate is less than predetermined threshold value.
7. the method for claim 1 is it is characterised in that working as access request is HTML (Hypertext Markup Language) http access request
When, the header field information that this access request carries includes at least one in following information:The language Accept- that user accepts
Language information, user accept coded system Accept-Encoding information, user agent's User-Agent information and
Subscription client information.
8. method as claimed in claim 2 is it is characterised in that determine each access according to the minimum access set of information loss rate
The unification user mark of user, specifically includes:
The different access subclass comprising in being gathered using minimum the accessing of information loss rate respectively is as the system of different access user
One ID.
9. a kind of device of interaction of user data is it is characterised in that include:
Receiving unit, for receiving each initial use accessing the access request that user submits to, carrying access user in access request
Family mark, at least one header domain information and network address mark;
Select unit, for selecting at least one header domain information and access from the header domain information that each access request carries
User corresponding network address mark composition is multiple to access set;
Determining unit, for accessing set for each, determines that this access is integrated into corresponding letter in the range of specified data traffic
Breath loss rate, wherein, information loss rate characterizes the standard determining each unification user mark accessing user using this access set
Really property;
Data interaction unit, determines each described unification user accessing user for the set that accesses minimum according to information loss rate
Mark, and according to each each user data accessing user of described unification user mark interaction accessing user.
10. device as claimed in claim 9 is it is characterised in that described determining unit, including:
Combination subelement, for gathering for each access, the content of the header domain information being comprised according to this access set, should
Access set reconfigures closes for multiple access subsets, and the element that each access subset closes is content and the network of header domain information
Address identifies;
Statistics subelement, is combined in each self-corresponding institute in the range of described specified data traffic, counting each access subset
The data traffic carrying is had on initial user mark;
Determination subelement, carries for being combined in each self-corresponding all initial user marks according to each access subset of statistics
Data traffic, determine that this access is integrated into corresponding information loss rate in the range of described specified data traffic.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210356956.6A CN103685198B (en) | 2012-09-21 | 2012-09-21 | A kind of method and apparatus of interaction of user data |
TW101146891A TWI579708B (en) | 2012-09-21 | 2012-12-12 | Method and apparatus for interacting with user data |
US14/023,060 US9525744B2 (en) | 2012-09-21 | 2013-09-10 | Determining a uniform user identifier for a visiting user |
PCT/US2013/059186 WO2014046934A1 (en) | 2012-09-21 | 2013-09-11 | Determining a uniform user identifier for a visiting user |
JP2015533107A JP5922848B2 (en) | 2012-09-21 | 2013-09-11 | Determining a unified user identifier for visiting users |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210356956.6A CN103685198B (en) | 2012-09-21 | 2012-09-21 | A kind of method and apparatus of interaction of user data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103685198A CN103685198A (en) | 2014-03-26 |
CN103685198B true CN103685198B (en) | 2017-03-01 |
Family
ID=50321524
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210356956.6A Active CN103685198B (en) | 2012-09-21 | 2012-09-21 | A kind of method and apparatus of interaction of user data |
Country Status (5)
Country | Link |
---|---|
US (1) | US9525744B2 (en) |
JP (1) | JP5922848B2 (en) |
CN (1) | CN103685198B (en) |
TW (1) | TWI579708B (en) |
WO (1) | WO2014046934A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107104928B (en) * | 2016-02-23 | 2020-06-12 | 阿里巴巴集团控股有限公司 | Service implementation method and device |
US10348745B2 (en) | 2017-01-05 | 2019-07-09 | Cisco Technology, Inc. | Associating a user identifier detected from web traffic with a client address |
US11783087B1 (en) * | 2019-10-15 | 2023-10-10 | Shape Security, Inc. | Facilitating secure client data transfer |
CN116776310B (en) * | 2023-08-23 | 2024-01-05 | 深圳红途科技有限公司 | Automatic user account identification method and device, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6141778A (en) * | 1998-06-29 | 2000-10-31 | Mci Communications Corporation | Method and apparatus for automating security functions in a computer system |
US7761558B1 (en) * | 2006-06-30 | 2010-07-20 | Google Inc. | Determining a number of users behind a set of one or more internet protocol (IP) addresses |
CN102143091A (en) * | 2010-08-06 | 2011-08-03 | 华为技术有限公司 | Cross-domain operation realization method, system, server and browser |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8490168B1 (en) | 2005-10-12 | 2013-07-16 | At&T Intellectual Property I, L.P. | Method for authenticating a user within a multiple website environment to provide secure access |
EP2413262A1 (en) * | 2006-03-29 | 2012-02-01 | The Bank of Tokyo-Mitsubishi UFJ, Ltd. | Apparatus, method, and program for validating user |
US8620896B2 (en) * | 2007-12-06 | 2013-12-31 | Yahoo! Inc. | Reverse matching relationships in networks of existing identifiers |
US8626926B2 (en) * | 2008-02-26 | 2014-01-07 | Qualcomm Incorporated | Method and apparatus for performing session info query for user plane location |
US8352319B2 (en) | 2009-03-10 | 2013-01-08 | Google Inc. | Generating user profiles |
US8204833B2 (en) | 2009-05-27 | 2012-06-19 | Softroute Corporation | Method for fingerprinting and identifying internet users |
JP2012014652A (en) * | 2010-07-05 | 2012-01-19 | Zenrin Datacom Co Ltd | Content distribution system and content distribution method |
US8913553B2 (en) * | 2010-07-23 | 2014-12-16 | Htc Corporation | Method of handling close subscriber group list synchronization |
US8429160B2 (en) | 2010-10-12 | 2013-04-23 | Robert Osann, Jr. | User preference correlation for web-based selection |
JP5596578B2 (en) * | 2011-01-26 | 2014-09-24 | ビッグローブ株式会社 | Address book creation system, address book creation method and program |
-
2012
- 2012-09-21 CN CN201210356956.6A patent/CN103685198B/en active Active
- 2012-12-12 TW TW101146891A patent/TWI579708B/en active
-
2013
- 2013-09-10 US US14/023,060 patent/US9525744B2/en active Active
- 2013-09-11 JP JP2015533107A patent/JP5922848B2/en active Active
- 2013-09-11 WO PCT/US2013/059186 patent/WO2014046934A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6141778A (en) * | 1998-06-29 | 2000-10-31 | Mci Communications Corporation | Method and apparatus for automating security functions in a computer system |
US7761558B1 (en) * | 2006-06-30 | 2010-07-20 | Google Inc. | Determining a number of users behind a set of one or more internet protocol (IP) addresses |
CN102143091A (en) * | 2010-08-06 | 2011-08-03 | 华为技术有限公司 | Cross-domain operation realization method, system, server and browser |
Also Published As
Publication number | Publication date |
---|---|
US20140089499A1 (en) | 2014-03-27 |
TWI579708B (en) | 2017-04-21 |
CN103685198A (en) | 2014-03-26 |
TW201413468A (en) | 2014-04-01 |
JP2015537282A (en) | 2015-12-24 |
US9525744B2 (en) | 2016-12-20 |
JP5922848B2 (en) | 2016-05-24 |
WO2014046934A1 (en) | 2014-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693981B2 (en) | Provisioning personalized content recommendations | |
US10362050B2 (en) | System and methods for scalably identifying and characterizing structural differences between document object models | |
CN102576443B (en) | Audience segment estimation | |
CN103678321B (en) | Page elements determine method and apparatus, user behavior determining method of path and device | |
CN102737019B (en) | Machine behavior determines method, web browser and web page server | |
CN107451199A (en) | Method for recommending problem and device, equipment | |
US8463896B2 (en) | Dynamic portal creation based on personal usage | |
EP3605355A1 (en) | Predicting user navigation events | |
US20170300485A1 (en) | Placement of hyperlinks in documents | |
CN102932206B (en) | The method and system of monitoring website access information | |
US20130086554A1 (en) | Analytics Driven Development | |
US20150082135A1 (en) | Method and system for generating comparable visual maps for browsing activity analysis | |
CN103685198B (en) | A kind of method and apparatus of interaction of user data | |
US20130198240A1 (en) | Social Network Analysis | |
Chuklin et al. | A comparative analysis of interleaving methods for aggregated search | |
CN104111970A (en) | Method and device for counting page average residence time and method and device for determining page user viscosity | |
US11314795B2 (en) | User navigation in a target portal | |
US10334057B2 (en) | Pattern based optimization of digital component transmission | |
CN107526748A (en) | A kind of method and apparatus for identifying user and clicking on behavior | |
CN103530392B (en) | Determine the method and apparatus of crawl flow | |
CN107092650A (en) | A kind of Web Log Analysis method and device | |
CN103365764B (en) | A kind of wireless page measurement techniques & apparatuses | |
Bracke | Web usage mining at an academic health sciences library: an exploratory study | |
CN107301192A (en) | A kind of terminal identification method and identification server | |
WO2016133568A1 (en) | Adaptive media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |